Results for: tls

Suggested Categories:

SSL & TLS Certificate Providers
SSL and TLS certificate providers issue digital certificates that secure online communications by encrypting data between a user’s browser and a website. These certificates authenticate the identity of a website, building trust with visitors and protecting sensitive information like passwords, credit card details, and personal data. SSL/TLS providers offer various types of certificates, such as domain validation (DV), organization validation (OV), and extended validation (EV), each with increasing levels of verification. Many providers also offer tools for managing and renewing certificates, as well as scanning for vulnerabilities to enhance site security. With SSL and TLS certificates, businesses ensure their websites are secure, compliant, and trustworthy for users.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
  • 1
    wolfSSL

    wolfSSL

    wolfSSL

    ...Its primary users are programmers building security functionality into their applications and devices. wolfSSL employs the dual licensing model, like MySQL, so it is available under commercial license terms for our commercial users and open source for the open source community. Support and consulting are also available from wolfSSL. wolfSSL is the most popular SSL/TLS security option for the IoT. We secure devices against the IoT's most prevalent threat vector, which is the MITM (man in the middle) attack. wolfSSL is also popular for use in heavy load server side or cloud environments, where cryptography performance is vital. Government applications also consume wolfSSL embedded SSL, as it is FIPS 140-2 enabled. ...
  • 2
    TL Connects

    TL Connects

    TL Connects

    With redemption rates averaging 3-5% and open rates of 98%, SMS Marketing is the most immediate and effective method of communication. Need to promote an offer, special deal, event or simply to get more people in on a rainy or slow day? Text marketing is your answer. SMS Marketing is convenient for customers and easy and effective for business owners. Customers want to hear from their favorite businesses and text messages are the best way to reach them. Our Trackable Text Offers are easy to...
    Starting Price: $199 per month
  • 3
    SwissSign

    SwissSign

    SwissSign

    SwissSign enables you to make your processes and business transactions even more efficient by allowing customers and employees to sign easily online. Signature service by SwissSign: The Swiss signature solution from SwissSign offers qualified electronic signatures (QES) which are ZertEs (Swiss Signature Act) and eIDAS compliant as well as advanced (AES) and simple electronic signatures (SES). The solution that suits your needs: Regardless of whether you are a private individual, SME...
  • 4
    Blue Check

    Blue Check

    Blue Check

    ...Utilizing State-of-the-Art AI and Cryptographic technologies, Blue Check ensures that these verifications are conducted with unparalleled efficiency, security, and affordability, delivering verification services at a cost of less than $1 per verification. Reclaim Protocol is the technology; Blue Check is the solution—a comprehensive verification stack for credential verification. BlueCheck goes beyond zkTLS, utilizing cutting-edge AI, agentic workflows, fine-tuned models, and cryptographic tools like zkTLS, zkEmail, and zkVMs. Both humans and AI need tools to verify information for high-stakes decisions. That’s what Blue Check delivers: a suite of ready-to-integrate verification tools coming soon to power your product.
    Starting Price: $1
  • 5
    Cloudbrink

    Cloudbrink

    Cloudbrink

    ...Built as a software-only service, Cloudbrink delivers sub-20ms latency and 1Gbps+ speeds per user using dynamically deployed FAST edges and a proprietary protocol that recovers packet loss before it impacts the app. Security isn’t bolted on—it’s built in. With mutual TLS 1.3, short-lived certs, and no exposed IPs, Cloudbrink provides real zero trust without making users suffer through poor connections or overloaded POPs. If you’ve been burned by “next-gen” solutions that still feel like 2008, it might be time for something new.
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 6
    Degama DTMS

    Degama DTMS

    Degama Systems

    Integrated Dispatch, Driver Dispatch, Accounting & Fleet Maintenance Software for Car Part Carriers, TL, LTL, Courier & Brokerage. Quoting, Order Booking, Document Management, Auto-Billing, Auto-Rating, Pre-Scheduling, Dispatch, Auto-Routing, Monitoring, EDI, Mobile POD for Android, Mobile IOS Iphone, GPS, Mapping, Messaging, Scanning, Driver/Broker Settlements, Fuel tax IFTA, Fleet Maintenance, Mechanics App, A/R, A/P, G/L, F/R . Custom Deployment for Unique Trucking Companies. ...
    Starting Price: $159/user/month
  • 7
    SparkTG

    SparkTG

    SparkTG

    ...We ensure 24/7 network monitoring to solve the issues even before they can start to affect your business. Our customer support team is active 24/7. All calls are encrypted for high-grade security, which means that you can use Transport Layer Security (TLS) and Secure Real-time Transport Protocol (SRTP).
    Starting Price: $5.00/month/user
  • 8
    Kamzan

    Kamzan

    Kamzan

    ...All data is encrypted with a different key for each private cloud, just as the database on which the service is based is also encrypted. The encrypted communication protocol uses a unique TLS 1.3 certificate for each customer. A uniquely European supply chain and a contract in which we make it clear that profiling will never be carried out, that no data will ever be sold or transferred to third parties and that the intellectual and physical property of the data in their entirety is held by the client company.
  • Previous
  • You're on page 1
  • Next